Source. Target. speed =? speed =? speed =?

Size: px
Start display at page:

Download "Source. Target. speed =? speed =? speed =?"

Transcription

1 Measuring Bottleneck Link Speed in Packet-Switched Networks Robert L. Carter and Mark E. Crovella Computer Science Department, Boston University 111 Cummington St., Boston MA BU-CS March 15, 1996 Abstract The quality of available network connections can often have a large impact on the performance of distributed applications. For example, document transfer applications such as FTP, Gopher and the World Wide Web suer increased response times as a result of network congestion. For these applications, the document transfer time is directly related to the available bandwidth of the connection. Available bandwidth depends on two things: 1) the underlying capacity of the path from client to server, which is limited by the bottleneck link and 2) the amount of other trac competing for links on the path. If measurements of these quantities were available to the application, the current utilization of connections could be calculated. Network utilization could then be used asabasis for selection from a set of alternative connections or servers, thus providing reduced response time. Such a dynamic server selection scheme would be especially important in a mobile computing environment in which the set of available servers is frequently changing. In order to provide these measurements at the application level, we introduce two tools: bprobe, which provides an estimate of the uncongested bandwidth of a path and cprobe, which gives an estimate of the current congestion along a path. These two measures may be usedincombination to provide the application with an estimate of available bandwidth between server and client thereby enabling application-level congestion avoidance. In this paper we discuss the design and implementation of our probe tools, specically illustrating the techniques used to achieve accuracy and robustness. We present validation studies for both tools which demonstrate their reliability in the face of actual Internet conditions and we give results of a survey of available bandwidth to a random set of WWW servers as a sample application of our probe technique. We conclude with descriptions of other applications of our measurement tools, several of which are currently under development. 1 Introduction For many applications, the quality ofnetwork connections can havealarge impact on performance. One important characteristic of a network connection is the bandwidth available to clients using that connection. In particular, for document transfer applications (e.g. FTP, Gopher and the World Wide Web) higher available bandwidth implies faster document transfer time. Available bandwidth depends on two things: 1) the underlying capacity ofthepath between client and server which is limited by theslowest (or bottleneck) link, and 2) the presence of competing trac (congestion). 1

2 One technique to minimize the time between document request and document arrival begins with an evaluation of the quality of a set of connections to candidate servers. The application may thenchoose to retrieve the document from the server with the highest quality connection. In this context, the quality of the network connection is determined by an estimate of network utilization which can be used to assess potential transfer time. Utilization, in turn, depends on both the bandwidth of the path (limited by the bottleneck link) and the presence of other trac competing for the path. However, neither of these two useful pieces of information are readily available to applications. In order to discover this information we developed two tools: bprobe, which measures the uncongested bandwidth of the bottleneck link of a connection and cprobe, which estimates the current congestion along the bottleneck link of the path. When applications are provided with measurements of the current network state, application-level congestion avoidance becomes possible. By application-level congestion avoidance we mean that applications can use estimates of trac volume to actively avoid paths that are currently heavily loaded. The measurement of bottleneck link speed involves sending a series of ICMP echo packets from source to destination and measuring the inter-arrival times between successive packets. Under certain conditions analysis of the distribution of the inter-arrival times leads to a straightforward, yet reliable, calculation of the bottleneck link speed of the connection. Bprobe is specically designed to make the necessary conditions occur and performs the analysis required to make a robust estimate of bottleneck link speed. The method of measurement of competing trac used by cprobe also relies on echo packets. An estimate of congestion can be made based on the elapsed time between the return of the rst and last of a series of packets and the amount ofdata sent by the probe tool. Cprobe is designed to make a reliable estimate of competing trac under real network conditions. In the following sections we motivate and describe bprobe and cprobe. We present the theory behind the tools and explain the obstacles to making reliable measurements in practice. We then explain how the the probe tools were designed to overcome these obstacles. We also describe the validation process in which we compared the measurements made by our tools to known link capacities on local, regional and wide-area networks. We present the results of a survey of WWW servers and discuss the implications of our ndings for replication and server selection. We conclude with a discussion of ongoing and future work. 1.1 Related Work In [2], the author gives a model for packet travel through links and routers along a connection in the Internet. The bandwidth of the bottleneck link is studied by comparing the round-trip times (rtt) of adjacent packets from a sequence sent at regular intervals. The rtt's of successive packets are plotted against each other (rtt i vs rtt i;1). The inverse of the slope of a line tted to this data gives the bandwidth and the intercept gives the latency. The line tting is done by hand and a very large number of packets are needed to make manual tting possible. An expanded version of that paper gives preliminary suggestions as to how this process can be used to determine the makeup of interfering trac [1]. However, many obstacles exist to the automatic application 2

3 of this idea in real networks. Our work overcomes these obstacles and results in a robust procedure that can calculate the bottleneck link speed with minimal overhead. The author in [6], denes the notion of a packet-pair, two back-to-back packets that travel from source to destination and result in two acknowledgment packets returning. The calculation of bandwidth based on the returning ACKs is similar to ours but in that work, a network of Rate-Allocating Servers (RAS) is assumed. With RAS each incoming stream of packets is served in turn with one packet processed from each queue in its turn if any packets are present. This in eect shares the packet processor equally among all incoming lines. Thus, the actual bandwidth available to the source can be accurately measured since the inter-arrival time of two packets from the same source will be increased by the processing time of one packet from each competing input line in use. In contrast, we assume the conditions prevalent in the current Internet, which are much less tractable, and we require only that packets not be reordered in transit. Treno [3] is a tool from Pittsburgh Supercomputer Center that emulates a TCP connection including slowstart and necessary retransmissions. They have set up a Web-based server that measures the path back to the calling client. Using a scheme similar to traceroute, it sends UDP packets with increasing TTL along the path from the server to the invoking client. Then it reports the available bandwidth that TCP would nd along each of the path prexes to the destination. In order to get the full eect of TCP, it is recommended that the tool be run for at least 10 seconds of continuous trac. In contrast, our cprobe tool measures the estimated available bandwidth without regard to any particular higher-level protocol while our bprobe tool measures the underlying bottleneck link speed. In addition, we nd that our measurement process is typically faster than the 10 seconds necessary for treno to reliably measure the bandwidth available using TCP. 2 Measuring Bandwidth and Congestion at the Application Level We use the term base bandwidth of a connection to mean the maximum transmission rate that could be achieved by the connection in the absence of any competing trac. This will be limited by the speed of the bottleneck link, so we alsorefer to this as the bottleneck link speed. However, packets from other connections may share one or more of the links along the connection we want to measure this competing trac lowers the bandwidth available to our application. We use the term available bandwidth to refer to the estimated transfer rate available to the application at any instant. In other words, the portion of base bandwidth which is not used by competing trac. We dene the utilization of a connection as the ratio of available bandwidth to base bandwidth, that is, the percentage of the base bandwidth which should be available to the application. If a measure of current utilization is available, applications can make informed resource allocation decisions. For the specic problem of WWW server selection, knowledge of current network utilization allows better prediction of information transfer time from the candidate servers. With this objective in mind, we set out to develop tools to measure the current utilization of a connection. These measurements are necessarily done from a distance and in a unknown environment. Therefore, we refer 3

4 Source speed =? speed =? speed =? Target Figure 1: Path from Source to Target. Initially, the link speeds are unknown. to our measurement process as probing and the tools as probes. Our design goals for the probes were that they: should work at the application level i.e. by usable by any user program should have a minimal impact on both the network and the server we are probing should not rely on cooperation from the network or the server should be robust and perform properly under varying conditions and should be as accurate as possible while providing timely information. The following sections describes the design and validation of bprobe and cprobe. 2.1 Bprobe: Measuring Base Bandwidth Measurement Theory In the following discussion we assume a network like theinternet. In such anetwork, a path between any two hostsinthenetwork is made up of one or more links. Between each set of links along the path is a router which examines the destination address of each packet and forwards it along the appropriate outgoing link. Our main requirement ofthenetwork is that packets are not frequently reordered in transit. We also assume that the path is stable, by whichwe mean that the path packets take atany instant will not change for the next few seconds, at least. For the Internet, routing table updates are infrequent enough that this is a reasonable assumption. We further assume that the bottleneck in both directions is the same link, although this assumption could be relaxed in a dierent design. Recall that the output of bprobe is a measurement of the base bandwidth of a connection: the speed of the bottleneck link. The situation is as presented in Figure 1. In order to compute utilization, it would be most useful to know the minimum speed among the links along the path from the Source to the Target. The method used by bprobe is to send a sequence of ICMP ECHO packets from the source to the target and measure the inter-arrival times of the returning packets. Figure 2 illustrates the journey of a pair of packets along the round-trip path from source to target and back. When the packets depart from the Source host, the inter-departure gap is measured as (d 2 ; d 1 ). As the packets ow through intermediate routers, the inter-packet gap may change as the packets ow over links of various 4

5 Source Network Target d_2 d_1 gap bottleneck link a_1 a_2 Inter-arrival time gap Figure 2: Flow of bprobe packets from Source to Target and back. The inter-packet gap is stretched by the bottleneck link. The inter-arrival time measured at the Source can be used to calculate the bottleneck link speed. capacities. In general, the size of the gap varies inversely with the capacity of the link. Figure 2 shows that the gap between the packets is stretched when the packets ow through the bottleneck link.on the return trip the packets ow again over the bottleneck link and the gap is unchanged. When the packets return to the Source, the inter-arrival time (a 2 ; a 1 ) reects the speed of the bottleneck link. The essential idea behind the probe, then, is this: if two packets can be caused to travel together such that they are queued as a pair at the bottleneck link, with no packets intervening between them, then the inter-packet spacing will be proportional to the processing time required for the bottleneck router to process the second packet of the pair. This well-known eect is illustrated in the familiar diagram shown in Figure 3 (adapted from Van Jacobson [5]). In addition, Bolot describes the basic eect in [1, 2] and Keshav has used a similar method in networks of Rate-Allocating servers [6]. The goal of the bprobe tool is to create this condition and to use it to make reliable measurements. In other words, if packets from the probe tool alone are queued at the bottleneck link, then the inter-arrival time of those pairs that were queued can be used at the endpoint of the path to estimate the base bandwidth of the bottleneck link. Under ideal conditions, the receiver can use this information to measure the bottleneck link speed as follows: the trailing edge of the rst of a pair of packets marks the time when the router started processing the second packet of the pair and the trailing edge of the second packet records the time when the router nished processing that packet. Given a packet of size P, and the inter-arrival time (or gap), we can estimate the base bandwidth 5

6 Minimum packet spacing at bottleneck link Same spacing is preserved on higher speed links Figure 3: Illustration of packet ow through a bottleneck link. Probe packets P4 P3 P2 P1 B P4 P3 P2 B P1 P4 P3 B P2 P1 = time to process P bytes of P2 Link speed estimate = P/delta Figure 4: Ideal case: probe packets alone queued at router. of the bottleneck link, B bls, as follows B bls bytes=second = P bytes gap seconds : This is illustrated in Figure 4 which shows the situation when probe packets alone are queued at a router Obstacles to Measuring Base Bandwidth in Practice However, in contrast to the the network architecture assumed in [6], in our experimental environment (the current Internet) this ideal behavior is not easily achieved. There are several problems that arise in practice: Queuing failure: Probe packets may not queue at the bottleneck link. Competing trac: Competing trac along the path may intervene between probe packets. 6

7 Probe packet drops: Packets sent by the probe may be dropped. Downstream congestion: Congestion at routers downstream from the bottleneck may invalidate the results. Eachofthese problems can be the cause of spurious estimates of base bandwidth. The major obstacle to implementation, then, is this: given a set of inter-arrival time measurements, how can the probe tool decide which will result in valid bandwidth estimates? The challenge was to start from the intuitive idea captured in Figure 3 and design an accurate, robust and low-impact tool to measure bandwidth. We now present our solutions to these problems Solutions to Implementation Problems Both bprobe and cprobe are built on top of the ICMP ECHO mechanism. Because of our use of ICMP ECHO, a client can send packets to a host and receive replies without installing new software at the remote site, which aords wide utility of our tools. There are two principal techniques with which we attack these problems. First, the use of multiple packets of varying sizes second, the tool uses a careful ltering process which discards inaccurate measurements. Queuing failure: The rst problem to overcome is that the client sending the probe packets may not happen to send data fast enough to cause queuing at the bottleneck router. In order to ensure such queuing, we senda number of packets and we use packets of varying sizes. Larger packets will naturally take more processing time at routers and increase the possibility of queuing. Therefore, we want to use as large a packet as can negotiate the round-trip path. The upper limit on packet size will vary from path to path, however, so we use packets of varying size. Currently, the probe runs in distinct phases with each phase using packets of successively larger sizes. The rst phase sends a number of packets (currently 10) of the smallest size that will be used (currently 124 bytes). The next phase uses even larger packets and this process continues until we reach the maximum packet size which our test client can send (approximately 8000 bytes). In this way, we adapt to the maximum feasible size for each connection. Competing trac: The second problem is the interference of other trac sharing a link along the path. In the ideal case, no non-probe packets intervene. One or more intervening packets will cause an increase in the inter-arrival time and therefore an underestimate of the bottleneck link speed. This is illustrated in Figure 5 which shows a non-probe packet queued between two probepackets. The resulting inter-arrival time measures the processing time for the P bytes of packet P2 as well as the unknown number of bytes contained in the intervening packet. Therefore, the estimated link speed will be an underestimate. The solution to this problem is two-fold. By sending a large number of packets, we increase the likelihood that some pairs will not be disrupted by competing packets. Even when many pairs are disrupted, the number 7

8 Probe packets P3 P2?? P1 B Other Traffic P3 P2?? B P1 P3 P2 B?? P1 P3 B P2?? P1 = time to process P bytes of P2 +?? other bytes Link speed estimate = P/delta Figure 5: Competing packets intervening between probe packets cause an underestimate of link speed. of intervening bytes will often vary from pair to pair. This results in diering bandwidth estimates which may then be ltered to determine the correct estimate. We explain the ltering process below. As a further measure, we increase the packet size by alternating factors of 150% and 250%. This ensures that no two packet sizes are integer multiples of each other. If we simply doubled the packet size, the bandwidth estimated when one packet of size x intervenes between probe packets of size y would be the same as the bandwidth estimated when two packets of size x intervene between probe packets of size 2y. As will be clear from the discussion of our ltering method, this could easily result in an erroneous nal estimate. The use of alternating increments diminishes the probability of a bad estimate. Probe packet drops: The third problem that must be addressed is dropped probe packets. Some packets are simply lost, but large packets are more likely to cause buer overow and be dropped. Large packets will be fragmented and this also increases the likelihood of dropped packets due to fragment loss. (Aside from this eect, fragmentation of large packets has not been a problem for our tools.) We avoid this problem by sending packets of varying sizes. Sending many packets of each size also serves to make the probe tolerant of a few packet losses regardless of the cause. Downstream congestion: The fourth problem occurs when queuing occurs on the return trip, after passing through the bottleneck link. That is, even if all goes well from client to the server and back through the bottleneck link, congestion at intermediate servers downstream from the bottleneck can invalidate an estimate. Consider a pair of packets whose inter-packet gap was properly set by the bottleneck link. If these packets subsequently get queued, the inter-packet gap will be reset, thus measuring the wrong link. Since this subsequent queuing is unlikely, we can alleviate this problem during ltering. Some of the pairs may, in fact, measure the wrong link but if enough of the pairs make itback without further queuing, the erroneous estimates will be ltered out. 8

9 111 Time Run 5 Run 4 Run 3 Run 2 Run Bottleneck link speed estimates (bps) Figure 6: 5 bprobe experiments to local 56Kbps hosts The Filtering Process: The most dicult problem that must be addressed by the probe is identication of those estimates that should be used to determine the base bandwidth from those that should be discarded due to lack of queuing, subsequent queuing or interference from competing trac. Each phase of 10 probe packets results in at most 9 inter-arrival measurements. Thus, at most 7 sets of at most 9 measurements each are the input to the ltering process. Given the packet size (and some intelligent guesses as to protocol headers and link level headers and trailers) each pair of packets generates one raw estimate of the bandwidth assuming queuing as dened before. For example, Figure 6 shows the raw estimates for 5 invocations of the probe tool. All of the data points belonging to one invocation are shown by plotting a numeral representing the invocation numberateachdata point. The abscissa of a data point is the bandwidth estimate, and the ordinate increases with packet size. Thus, all the measurements for the rst invocation occur on the bottom 5 line segments of the graph, all those for the second on the next higher 5 lines and so on. Within each invocation, packet size is increasing from bottom to top. Notice the clustering of estimate values as packet size increases this shows that, in general, larger packet sizes yield more consistent results. The multi-phase variable-packet-size design of the probe results in 1) correlation among correct estimates and 2) lack of correlation among incorrect estimates. For example, suppose all intervening packets are of size x, and the probe packet sizes for two probe phases are p1 andp2 with p1 6= p2. The estimates produced by the packet sequences p1 ; x ; p1 andp2 ; x ; p2 will both underestimate the base bandwidth, but the important characteristic is that the two estimates will dier. On the other hand, sequences like p1 ; p1 and p2 ; p2 will 9

10 produce agreeing correct estimates. Other incorrect estimates such as produced by the sequence p1;x;x;x;p1 will be even less correlated with the correct estimates and also uncorrelated with other. It is these properties of the data, which are evident in Figure 6, that we seek to exploit using non-linear ltering. We have tested two ltering methods both of which rely on computing an \error interval" around each estimate, and subjecting these intervals to further set operations as explained below. The error interval can be expanded as necessary until a satisfactory estimate of the speed of the bottleneck link is determined. The intersection ltering method nds overlaps between estimate intervals and computes the intersection, with the idea being that we want to nd the estimate that occurs in all sets. Since we observed that larger packets provide better estimates we start intersecting using the estimates from the largest packets and iteratively intersect with estimates derived from successively smaller packets. The union ltering method combines overlapping intervals using set union, and selects an interval only if enough sets contribute to it. Both methods produce one interval as the nal result and the midpoint ofthisinterval is returned as the nal estimate. The two methods are illustrated in Figure 7, in which two sets of estimates are combined using either Union or Intersection. In the top of the gure are histograms representing the two sets. The horizontal axis gives intervals of estimated bottleneck bandwidth (increasing to the right) and the vertical axis gives the number of measurements in each interval. The lower portion of the gure represents the histograms resulting from combination using the Union or Intersection operations. For the union result, the height of the histogram bar, h, and the number of sets which contribute to it, s, isshown under each interval using the notation: (h s). For example, the fourth interval has a total of 7 measurements which originate in 2 sets. In this case the only interval that has members from more than one set is the (7 2) interval and the midpoint of this interval would be the resulting estimate of bottleneck bandwidth. In our experience the union approachshows less dispersion of estimates than intersection and wehave adopted it as the ltering method currently used by bprobe Validation of bprobe To validate the base bandwidth probe tool, we performed three sets of experiments. We tested bprobe between a xed host and hosts on our local network, on our regional network, and on the wide-area network. For each of the networks we usedavailable maps of link capacities to determine the bottleneck link speed for each of the target servers. Therefore, we were able to compare the results of the tool against the known bottleneck link speeds. Local validation: First, we tested the probe to a set of 16 hosts on our local network, 9 of which were connected by Ethernet and 7 of which were connected over 56Kbps lines. Each minute over a period of 4 days we ran the probe tool and recorded the bandwidth estimate. The results of these tests are summarized in Figure 8 and Figure 9 which presents histograms of bprobe bandwidth estimates for the two classes. In both gures, the histogram bins are labeled with bottleneck link speeds in bits-per-second. Figure 8 shows the histogram 10

11 number of measurements Set 1 number of measurements Set 2 bandwidth estimate number of measurements (3,1) (3,1) (2,1) (7,2) (1,1) (3,1) (1,1) UNION (Set1, Set2) number of measurements INTERSECTION (Set1, Set2) bandwidth estimate Figure 7: Filtering process: Union and Intersection operators 11

12 7 local 56Kbps hosts Bottleneck Link Speed Figure 8: Histogram of bprobe results: local 56Kbps hosts of the estimated bottleneck link speeds for the 7 56Kbps hosts Figure 9 shows the histogram of the estimated bottleneck link speeds for the 9 Ethernet (10Mbps) hosts. Both gures show the majority of the estimates closely clustered about the expected values, even though the expected valuesofthetwo host sets dier by two orders of magnitude. Regional validation: The next set of tests was performed within NearNet, the regional network to which our site belongs. Here we were able to add a third category of bottleneck capacity: T1. For the regional network we have sets of hosts with bottleneck link capacities of 56Kbps, 1.544Kbps (T1) and 10Mbps (Ethernet). Once again the measurements were made periodically over a few days and the results are presented as histograms of bottleneck link speed estimates. Figure 10 shows the histogram of bottleneck bandwidth estimates for the hosts known to have a 56Kbps bottleneck. The histogram of bandwidth estimates for 681 probes of the 6 hosts shows avery tight grouping of estimates. Although there is a consistent underestimate, we still nd 73% of the estimates within 5% of the theoretical capacity, 87% of the estimates within 10% of the theoretical capacity and 92% of the estimates within 20% of the theoretical capacity. For the hosts with a T1 bottleneck, Figure 11 gives the histogram of 1156 probes of the 9 hosts. The picture is a little less clear for this case as there appear to be several minor peaks in the data. However, we still nd most of the estimates close to the rated capacity. In particular, we nd: 23% of the estimates within 5% of the 12

13 9 local Ethernet hosts *10^6 8.50*10^6 9*10^6 9.50*10^6 10^7 1.05*10^7 Bottleneck Link Speed Figure 9: Histogram of bprobe results: local Ethernet hosts 6 56kbps hosts on NearNet Bottleneck Link Speed Figure 10: Histogram of bprobe results: Nearnet 56Kbps hosts 13

14 9 T1 hosts on NearNet *10^5 10^6 1.5*10^6 2*10^6 2.5*10^6 Bottleneck Link Speed Figure 11: Histogram of bprobe results: Nearnet T1 hosts 3 Ethernet hosts on NearNet *10^6 4*10^6 6*10^6 8*10^6 10^7 1.2*10^7 1.4*10^7 Bottleneck Link Speed Figure 12: Histogram of bprobe results: Nearnet Ethernet hosts 14

15 4 56kb hosts on SURANet Bottleneck Link Speed Figure 13: Histogram of bprobe results: SURANET 56Kbps hosts rated capacity, 52% of the estimates within 10% of the rated capacity and 75% of the estimates within 20% of rated capacity. Finally, Figure 12 shows the histogram for regional hosts connected by Ethernet. The 397 probes of the 3 Ethernet hosts resulted in another tight grouping, with fractiles comparable to the results for the 56Kbps hosts. For the 10Mbps hosts we nd: 68% of the estimates within 5% of the 10Mbps capacity, 86% of the estimates within 10% of the 10Mbps capacity and 92% of the estimates within 20% of the 10Mbps capacity. Wide-area validation: The nal validation test was done using a set of hosts on SURANET, a regional network in the Baltimore{Washington, D.C. metropolitan area. Hosts on this regional net are approximately 16 hops away from our test client including 7 MCI backbone hops. Once again, we were able to obtain capacity maps which let us independently verify the capacity of the bottleneck linktoeach of the selected hosts. Figure 13 shows the histogram of bandwidth estimates for the 611 probes of the 4 56Kbps hosts. Once again, the histogram shows a tight grouping of estimates near the known bottleneck speed. Figure 14 shows the histogram of bandwidth estimates for the 459 probes of the 3 T1 hosts. In this case, as in the regional case, we nd minor peaks around the main peak at the expected value. We suggest an explanation in the Discussion section below. Figure 15 shows the histogram of bandwidth estimates for the 475 probes of the 3 Ethernet hosts. Here we nd a fair amount of serious underestimates, but the bulk of the data is still clustered around the known value. 15

16 3 T1 hosts on SURANet *10^5 10^6 1.5*10^6 2*10^6 Bottleneck Link Speed Figure 14: Histogram of bprobe results: SURANET T1 hosts 3 Ethernet Hosts on SURANet *10^6 10^7 1.5*10^7 Bottleneck Link Speed Figure 15: Histogram of bprobe results: SURANET Ethernet nodes 16

17 Summary and Discussion Relative error values for the three sets of hosts are given in Table 1, which presents a more quantitative view of the validation results. The columns show percentages of error relative to the rated capacity of the bottleneck link each rowgives measurements for a particular subset of hosts. Each entry in the table gives the percentage of the bandwidth estimates that fall within agiven relative percentage of the rated capacity. For example, 96% of the bandwidth estimates of local 56Kbps hosts were within 10% of 56Kbps. As is evident from Figure 8 there is a systematic underestimation error due to unaccounted for link-level encapsulation overhead. In practice, this should not be a signicant problem. For example, this could be addressed using a table of commonly available capacities to round the bandwidth estimates to the nearest likely value. The results for T1 connections at the regional and wide-area levels were surprising. In contrast to the single large peaks found in the histograms for the other link capacities, for the two T1hostsetswe nd multiple peaks in the histograms (Figures 11 &14). An immediate suggestion was that the peaks correspond to individual hosts and represent underlying hardware dierences. However, this is not the case. Bottleneck link speed estimates for any particular host were found in many ofthepeaks. Our hypothesis is that consistent cross-trac consisting of small packets of nearly equal size could cause this eect. Such trac might be generated by telnet sessions, for example. This competing trac would result in underestimation of bottleneck bandwidth as explained in section If the source of the cross-trac was regular enough, many of the resulting underestimates produced by bprobe would agree and thus defeat our ltering process. The resulting estimate of bottleneck link speed for the host would then be an underestimate. Nevertheless, as measured by the fractile statistics, the estimates in these cases are still fairly accurate. Relative Error Network Rated Capacity No. Hosts 5% 10% 20% Local 56Kbps 7 55% 96% 99% 10Mbps 9 80% 97% 100% Regional 56Kbps 6 73% 87% 92% 1.54Mbps 9 23% 52% 75% 10Mbps 3 68% 86% 92% Wide-area 56Kbps 4 84% 93% 97% 1.54Mbps 3 12% 54% 82% 10Mbps 3 31% 53% 63% Table 1: Measurements of bprobe accuracy for local, regional and wide-area host sets. The results of these three sets of experiments convince us of the accuracy of the probe tool. For three very dierent classes of hosts we were able to accurately measure the base bandwidth of links using bprobe. As we move from local to regional and then wide-area hosts, the tool shows only a minor loss in estimate accuracy. 17

18 Considering now our stated goals, we nd that bprobe does provide accurate base bandwidth estimates in spite of the dicult environment it measures it operates without explicit cooperation from the network or servers and it provides reliable estimates without excessive timeoverhead. At the current time, a reasonable concern is the probe's impact on the network. The current implementation consumes too much network bandwidth. Two approaches are under development: First, we believe we can achieve nearly the same accuracy and reliability with fewer packets and second, it is anticipated that the base bandwidth estimate of a path will be cached, so that redundant measurements of a path will be unnecessary Survey of Bottlenecks to WWW Servers As a further demonstration of the use of bprobe we surveyed a set of 5825 randomly selected WWW servers to get an idea of the distribution of base bandwidth of connections to servers on the WWW. The servers were chosen uniformly from a list obtained from [7]. Previously, we performed a similar survey primarily concerned with the distribution of hops and latency to WWW Servers [4]. During the latest survey we gathered these statistics in addition to bandwidth estimates. For the set of 5825 servers, Figure 16 presents the distribution of hops (measured by traceroute) and Figure 17 gives the distribution of latencies (measured by ping). As discussed in [4] the striking dierence between the two distributions has implications for replica placement and server selection. In particular, the lack ofcorrelation between the two measures suggests that hops is a bad predictor of latency, andthus a bad metric for distance in an internetwork. What is needed is a dynamic measurement ofcurrentnetwork conditions. This observation motivated us to design bprobe and cprobe. Figure 18 shows the histogram of bottleneck link speed estimates from this survey of WWW servers. Notice the distinct peak at 10Mbps. There are no higher estimates because the survey was run from a machine on a 10Mbps local network. Since bprobe measures the bottleneck link, readings higher than this should not be expected. Another concentration of estimates appears around 1 Mbps. Inspecting the data, we nd that of the 5825 servers surveyed, 2586 have bottleneck bandwidth estimates greater than 5Mbps. In other words, about 44% of the servers were reachable at Ethernet speeds. However, nearly 56% of the servers surveyed had a bottleneck link speed less than half of Ethernet speed and nearly 40% of them exhibit a bottleneck less than 20% of Ethernet speed. In Figure 19 we restrict the histogram to estimates smaller than 200Kbps. This range includes servers with a low-speed modem as the bottleneck aswell as other low-capacity connections. There are 659 (about 10%) of the servers with bottlenecks in this range. There is a clear peak at 56Kbps, a value which wehave established as a common bottleneck speed in our validation experiments. Another peak appears near the ISDN rate of 128Kbps. Figure 20 gives estimates in the range 200Kbps to 2Mbps, a region which includes T1 connections, fractional T1 and other values. This region includes 2351, or about 40% of the servers surveyed. What are the implications of this distribution for replication and server selection? If we assume a uniform distribution of copies of popular documents over this set of servers, it becomes clear that measurement ofthe 18

19 Figure 16: Histogram of hops to 5825 WWW Servers Figure 17: Histogram of latencies to 5825 WWW Servers 19

20 5825 WWW Servers *10^6 4*10^6 6*10^6 8*10^6 10^7 1.2*10^7 1.4*10^7 Bottleneck Link Speed Figure 18: WWW survey results: histogram of bottleneck link speeds to 5825 WWW servers 5825 WWW Servers [Zoom in on (0 to 200,000 bps)] Bottleneck Link Speed Figure 19: WWW survey results: subset (10%) of servers with bottleneck link speeds less than 200Kbps 20

21 5825 WWW Servers [Zoom in on (200,000 to 2,000,000 bps)] *10^5 10^6 1.5*10^6 2*10^6 Bottleneck Link Speed Figure 20: WWW survey results: subset (40%) of servers with bottleneck link speeds between 200Kbps and 2Mbps bottleneck linkspeed is of prime importance when achoosing among replicas. For this distribution, choosing a server at random gives a better than even chance of getting a slow link. Clearly, achoice based on available bandwidth should give better performance. More precise evaluation of the amount of improvement to be gained by dynamic server selection policies are the focus of our current work. 2.2 Cprobe: Measuring Available Bandwidth In the previous section we described our bandwidth probing tool which gives a fairly reliable estimate of the bottleneck link speed for a path between two hosts on the Internet. We now consider estimating available bandwidth. To measure available bandwidth, we developed a tool called cprobe. Cprobe's technique is straightforward: by bouncing a short stream of echo packets o of the target server and recording the time between the receipt of the rst packet and the receipt of the last packet, we can measure the presence of competing trac on the bottleneck link. Dividing the number of bytes sent by this time yields a measure of available bandwidth, B avail, that represents the actual throughput achieved by the probe bytes. As long as we can send packetsata higher rate than the bottleneck link speed (which we can measure using bprobe) this eect should occur. Any additional time lag between the rst packet and the last one represents delay due to intervening non-probe bytes (competing trac). The utilization of the bottleneck link can then be computed as the ratio of available bandwidth measured by 21

22 cprobe to the bottleneck link speed as estimated by bprobe: U probe = B avail B bls : In practice, we discovered a complication during testing of cprobe. Occasionally, the sending host would be momentarily delayed due to operating system eects, delaying the returning ow of packets. This resulted in an unusually long delay between one pair of packets which then caused an overestimate of competing trac, since the delay was wrongly attributed entirely to trac. In addition, scheduling eects on the receiving side can cause the inter-packet time to be unrealistically short. To eliminate these two kinds of erroneous readings from ourdatawe discard the highest and lowest inter-arrival measurements when calculating B avail. We have found that this improves the accuracy of the measurements signicantly. In order to tolerate packet drops and possible re-ordering of packets (which invalidate inter-arrival time measurements), we use the results of four separate 8-packet streams when calculating the available bandwidth. As in the case of bprobe, caremustbetaken to ensure that the cprobe's results are valid. We validated the individual inter-arrival measurements using a packet tracing tool running on a local Ethernet. The experimental set-up consisted of the probe client and the probe target a host running the packet trace tool and other hosts between which FTP sessions were run to provide a background load. While varying the background load we ran several repetitions of the probe tool. We then compared the probe's measurements of packet inter-arrival times with the log of the packet traces. The probe's measurements of elapsed time for packet transfers were generally accurate to within 10% relative to the packet trace measurements. We then compared cprobe's estimate of available bandwidth with that derived from the packet trace log. Using the log, we calculated the time dierence between the rst and last reply, and divided by the amount of data sent, duplicating the calculation done by cprobe. The measurements are quite accurate as can be seen from the fractile results in Table 2. Three quarters of the measurements are within 5% of the actual value and all are with 25% of the actual value. Of course, these results are limited to the local-area network where we can control the cross-trac and measure all probe and non-probe packets. Beyond the local network validation becomes very dicult. Relative error Fractile Percentage of measurements within Fractile 5% 74% 10% 81% 15% 88% 20% 92% 25% 100% Table 2: Fractile quantities for cprobe's available bandwidth estimates. Evaluating cprobe against our design goals we nd that it operates without relying on support from servers or the network that it's impact on the network is not too great and that the measurement ofavailable bandwidth 22

23 is quite accurate. An open question is the predictive ability of the measurements of available bandwidth provided by cprobe. Can the measurements be used to reliably predict the available bandwidth in the future? If so, how far into the future and with what degree of accuracy? 3 Future Directions and Conclusions We have plans to extend this work in several directions. Our primary interest is using bprobe and cprobe in addition to ping to gather current information about the state of the network and using this information as input to dynamic server selection algorithms. We plan to evaluate the contribution of each of these measurement techniques and combinations of them to determine which are of use in selecting a server dynamically. Currently, we are building a version of the Mosaic WWW browser which uses the bprobe tool to inform the user of the relative expected transfer speeds of links on a Web page. The hypertext anchor is color-coded with a measure of the current network state. For instance, faster expected transfers are coded green while slower ones are red. Another browser extension we are considering is support for multiple URLs per link in a document. This list of alternate servers can be used as input to dynamic server selection by thebrowser. This represents a step along the way tointegrated support for replication in which the browser would have toobtain a list of replicas. Such amechanism might be particularly attractive toheavily loaded sites. We also plan to package the probe tools as a daemon that can be placed strategically throughout a network to allow probing of conditions in remote parts of the network. This would also allow measurement of a link as a part of several paths providing conrmation of probe estimates. In conclusion, we have introduced and validated two tools useful for measuring network conditions at the application level: bprobe, which uses ECHO packets to measure the bottleneck link speed of paths between hosts in the Internet and cprobe, which measures the presence of competing trac on the bottleneck link. We have presented validation results for each toolshowing that accurate and reliable measurements of bottleneck link speed can be made under real network conditions. As an example application of our tools we presented a study in which weusedbprobe to measure the base bandwidth to a set of WWW servers. The results of this survey illustrate the potential for performance improvements based on dynamic measurement of current network conditions such asprovided by bprobe and cprobe. References [1] Jean-Chrysostome Bolot. Characterizing End-to-End packet delay and loss in the Internet. Journal of High Speed Networks, 2(3):305{323, [2] Jean-Chrysostome Bolot. End-to-End Packet Delay and Loss Behavior in the Internet. In Proceedings of SIGCOMM 1993, pages 289{298. ACM SIGCOMM, August

24 [3] Pittsburgh Supercomputer Center. About the PSC Treno Server. Available at pscnoc/treno info.html., November [4] Mark E Crovella and Robert L. Carter. Dynamic server selection in the internet. In Third IEEE Workshop on the Architecture and Implementation of High Performance Computer Systems'95, pages 158{162, Mystic, Connecticut, August [5] Van Jacobson. Congestion Avoidance and Control. In Proceedings SIGCOMM '88 Symposium on Communitations Architectures and Protocols, pages 314{329, Stanford, CA, August [6] Srinivasan Keshav. A Control-Theoretic Approach toflow Control. In Proceedings of SIGCOMM ACM SIGCOMM, [7] net.genesis Corporation. Comprehensive list of sites. Available at April

Paper C. c Institute of Electrical and Electronics Engineers, Inc. 2000 Reprinted with permission.

Paper C. c Institute of Electrical and Electronics Engineers, Inc. 2000 Reprinted with permission. Paper C Bob Melander, Mats Björkman, and Per Gunningberg. A New End-to-End Probing and Analysis Method for Estimating Bandwidth Bottlenecks. Proceedings of IEEE GLOBECOM 00, San Francisco, CA, USA, November

More information

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP) TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page

More information

Protocols. Packets. What's in an IP packet

Protocols. Packets. What's in an IP packet Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets

More information

Communications and Computer Networks

Communications and Computer Networks SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the

More information

Internet Infrastructure Measurement: Challenges and Tools

Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Outline Motivation Challenges Tools Conclusion Why Measure? Why Measure? Internet, with

More information

Bandwidth Measurement in xdsl Networks

Bandwidth Measurement in xdsl Networks Bandwidth Measurement in xdsl Networks Liang Cheng and Ivan Marsic Center for Advanced Information Processing (CAIP) Rutgers The State University of New Jersey Piscataway, NJ 08854-8088, USA {chengl,marsic}@caip.rutgers.edu

More information

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph Assignment #3 Routing and Network Analysis CIS3210 Computer Networks University of Guelph Part I Written (50%): 1. Given the network graph diagram above where the nodes represent routers and the weights

More information

Data Networks Summer 2007 Homework #3

Data Networks Summer 2007 Homework #3 Data Networks Summer Homework # Assigned June 8, Due June in class Name: Email: Student ID: Problem Total Points Problem ( points) Host A is transferring a file of size L to host B using a TCP connection.

More information

Lecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage

Lecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage Lecture 15: Congestion Control CSE 123: Computer Networks Stefan Savage Overview Yesterday: TCP & UDP overview Connection setup Flow control: resource exhaustion at end node Today: Congestion control Resource

More information

Requirements of Voice in an IP Internetwork

Requirements of Voice in an IP Internetwork Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.

More information

Sage ERP Accpac Online

Sage ERP Accpac Online Sage ERP Accpac Online Mac Resource Guide Thank you for choosing Sage ERP Accpac Online. This Resource Guide will provide important information and instructions on how you can get started using your Mac

More information

Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1

Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1 Sage 300 ERP Online (Formerly Sage ERP Accpac Online) Mac Resource Guide Updated June 1, 2012 Page 1 Table of Contents 1.0 Introduction... 3 2.0 Getting Started with Sage 300 ERP Online using a Mac....

More information

NETWORK LAYER/INTERNET PROTOCOLS

NETWORK LAYER/INTERNET PROTOCOLS CHAPTER 3 NETWORK LAYER/INTERNET PROTOCOLS You will learn about the following in this chapter: IP operation, fields and functions ICMP messages and meanings Fragmentation and reassembly of datagrams IP

More information

STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT

STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT 1. TIMING ACCURACY The accurate multi-point measurements require accurate synchronization of clocks of the measurement devices. If for example time stamps

More information

Basic Multiplexing models. Computer Networks - Vassilis Tsaoussidis

Basic Multiplexing models. Computer Networks - Vassilis Tsaoussidis Basic Multiplexing models? Supermarket?? Computer Networks - Vassilis Tsaoussidis Schedule Where does statistical multiplexing differ from TDM and FDM Why are buffers necessary - what is their tradeoff,

More information

Introduction to LAN/WAN. Network Layer

Introduction to LAN/WAN. Network Layer Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services

More information

End-to-end Throughput-related Performance Metrics

End-to-end Throughput-related Performance Metrics Constantinos Dovrolis, Mark Allman, k claffy Oct. 2001 CAIDA Request for Comments: CAIDA-E2E-001 Obsoletes: none Category: DRAFT End-to-end Throughput-related Performance Metrics 1 Goals of this draft

More information

Security vulnerabilities in the Internet and possible solutions

Security vulnerabilities in the Internet and possible solutions Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in

More information

Oscillations of the Sending Window in Compound TCP

Oscillations of the Sending Window in Compound TCP Oscillations of the Sending Window in Compound TCP Alberto Blanc 1, Denis Collange 1, and Konstantin Avrachenkov 2 1 Orange Labs, 905 rue Albert Einstein, 06921 Sophia Antipolis, France 2 I.N.R.I.A. 2004

More information

AKAMAI WHITE PAPER. Delivering Dynamic Web Content in Cloud Computing Applications: HTTP resource download performance modelling

AKAMAI WHITE PAPER. Delivering Dynamic Web Content in Cloud Computing Applications: HTTP resource download performance modelling AKAMAI WHITE PAPER Delivering Dynamic Web Content in Cloud Computing Applications: HTTP resource download performance modelling Delivering Dynamic Web Content in Cloud Computing Applications 1 Overview

More information

Avaya ExpertNet Lite Assessment Tool

Avaya ExpertNet Lite Assessment Tool IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...

More information

A Passive Method for Estimating End-to-End TCP Packet Loss

A Passive Method for Estimating End-to-End TCP Packet Loss A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se

More information

Effects of Filler Traffic In IP Networks. Adam Feldman April 5, 2001 Master s Project

Effects of Filler Traffic In IP Networks. Adam Feldman April 5, 2001 Master s Project Effects of Filler Traffic In IP Networks Adam Feldman April 5, 2001 Master s Project Abstract On the Internet, there is a well-documented requirement that much more bandwidth be available than is used

More information

Acceleration Systems Performance Assessment Tool (PAT) User Guide v 2.1

Acceleration Systems Performance Assessment Tool (PAT) User Guide v 2.1 Acceleration Systems Performance Assessment Tool (PAT) User Guide v 2.1 December 2015 Table of Contents 1 PAT... 1 1.1 Network Quality Report (Pre-test Evaluation)... 1 1.1.1 Raw MTR Data... 4 2 Executing

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.

More information

Evaluation and Characterization of Available Bandwidth Probing Techniques

Evaluation and Characterization of Available Bandwidth Probing Techniques IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 21, NO. 6, AUGUST 2003 879 Evaluation and Characterization of Available Bandwidth Probing Techniques Ningning Hu, Student Member, IEEE, and Peter

More information

LESSON 3.6. 98-366 Networking Fundamentals. Understand TCP/IP

LESSON 3.6. 98-366 Networking Fundamentals. Understand TCP/IP Understand TCP/IP Lesson Overview In this lesson, you will learn about: TCP/IP Tracert Telnet Netstat Reserved addresses Local loopback IP Ping Pathping Ipconfig Protocols Anticipatory Set Experiment with

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

File Transfer Protocol (FTP) Throughput Testing by Rachel Weiss

File Transfer Protocol (FTP) Throughput Testing by Rachel Weiss White Paper File Transfer Protocol (FTP) Throughput Testing by Rachel Weiss Introduction In today s complex networks it is often difficult to correlate different measurements that are reported by network

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3 SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange

More information

Estimation of available bandwidth and measurement infrastructure for. Russian segment of Internet

Estimation of available bandwidth and measurement infrastructure for. Russian segment of Internet 1 Estimation of available bandwidth and measurement infrastructure for Abstracts Russian segment of Internet Platonov A.P. 1), Sidelnikov D.I. 2), Strizhov M.V. 3), Sukhov A.M. 4) 1) Russian Institute

More information

First Midterm for ECE374 02/25/15 Solution!!

First Midterm for ECE374 02/25/15 Solution!! 1 First Midterm for ECE374 02/25/15 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam

More information

TCP in Wireless Mobile Networks

TCP in Wireless Mobile Networks TCP in Wireless Mobile Networks 1 Outline Introduction to transport layer Introduction to TCP (Internet) congestion control Congestion control in wireless networks 2 Transport Layer v.s. Network Layer

More information

The ISP Column A monthly column on all things Internet

The ISP Column A monthly column on all things Internet The ISP Column A monthly column on all things Internet Just How Good are You? Measuring Network Performance February 2003 Geoff Huston If you are involved in the operation of an IP network, a question

More information

WEB APPLICATION PERFORMANCE PREDICTION

WEB APPLICATION PERFORMANCE PREDICTION WEB APPLICATION PERFORMANCE PREDICTION H. Karlapudi and J. Martin Department of Computer Science Clemson University Clemson, SC 9-9 Email: hkarlap, jim.martin@cs.clemson.edu ABSTRACT In this paper, we

More information

15-441: Computer Networks Homework 2 Solution

15-441: Computer Networks Homework 2 Solution 5-44: omputer Networks Homework 2 Solution Assigned: September 25, 2002. Due: October 7, 2002 in class. In this homework you will test your understanding of the TP concepts taught in class including flow

More information

co Characterizing and Tracing Packet Floods Using Cisco R

co Characterizing and Tracing Packet Floods Using Cisco R co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1

More information

Question: 3 When using Application Intelligence, Server Time may be defined as.

Question: 3 When using Application Intelligence, Server Time may be defined as. 1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response

More information

COMP 361 Computer Communications Networks. Fall Semester 2003. Midterm Examination

COMP 361 Computer Communications Networks. Fall Semester 2003. Midterm Examination COMP 361 Computer Communications Networks Fall Semester 2003 Midterm Examination Date: October 23, 2003, Time 18:30pm --19:50pm Name: Student ID: Email: Instructions: 1. This is a closed book exam 2. This

More information

Using IPM to Measure Network Performance

Using IPM to Measure Network Performance CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring

More information

The Quality of Internet Service: AT&T s Global IP Network Performance Measurements

The Quality of Internet Service: AT&T s Global IP Network Performance Measurements The Quality of Internet Service: AT&T s Global IP Network Performance Measurements In today's economy, corporations need to make the most of opportunities made possible by the Internet, while managing

More information

Measuring IP Performance. Geoff Huston Telstra

Measuring IP Performance. Geoff Huston Telstra Measuring IP Performance Geoff Huston Telstra What are you trying to measure? User experience Responsiveness Sustained Throughput Application performance quality Consistency Availability Network Behaviour

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Clearing the Way for VoIP

Clearing the Way for VoIP Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.

More information

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying

More information

Ternary-Search-based Scheme to Measure Link Available-bandwidth in Wired Networks

Ternary-Search-based Scheme to Measure Link Available-bandwidth in Wired Networks Ternary-Search-based Scheme to Measure Link Available-bandwidth in Wired Networks Khondaker M. Salehin and Roberto Rojas-Cessa Networking Research Laboratory Department of Electrical and Computer Engineering

More information

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed. Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because routers are receiving packets faster than they can forward them, one

More information

Network Layer: Network Layer and IP Protocol

Network Layer: Network Layer and IP Protocol 1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols

More information

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: In view of the fast-growing Internet traffic, this paper propose a distributed traffic management

More information

Operating Systems and Networks Sample Solution 1

Operating Systems and Networks Sample Solution 1 Spring Term 2014 Operating Systems and Networks Sample Solution 1 1 byte = 8 bits 1 kilobyte = 1024 bytes 10 3 bytes 1 Network Performance 1.1 Delays Given a 1Gbps point to point copper wire (propagation

More information

Quality of Service versus Fairness. Inelastic Applications. QoS Analogy: Surface Mail. How to Provide QoS?

Quality of Service versus Fairness. Inelastic Applications. QoS Analogy: Surface Mail. How to Provide QoS? 18-345: Introduction to Telecommunication Networks Lectures 20: Quality of Service Peter Steenkiste Spring 2015 www.cs.cmu.edu/~prs/nets-ece Overview What is QoS? Queuing discipline and scheduling Traffic

More information

Advanced Computer Networks IN2097. 1 Dec 2015

Advanced Computer Networks IN2097. 1 Dec 2015 Chair for Network Architectures and Services Technische Universität München Advanced Computer Networks IN2097 1 Dec 2015 Prof. Dr.-Ing. Georg Carle Chair for Network Architectures and Services Department

More information

VMWARE WHITE PAPER 1

VMWARE WHITE PAPER 1 1 VMWARE WHITE PAPER Introduction This paper outlines the considerations that affect network throughput. The paper examines the applications deployed on top of a virtual infrastructure and discusses the

More information

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1) Lecture Objectives Wireless and Mobile Systems Design Lecture 07 Mobile Networks: TCP in Wireless Networks Describe TCP s flow control mechanism Describe operation of TCP Reno and TCP Vegas, including

More information

Low-rate TCP-targeted Denial of Service Attack Defense

Low-rate TCP-targeted Denial of Service Attack Defense Low-rate TCP-targeted Denial of Service Attack Defense Johnny Tsao Petros Efstathopoulos University of California, Los Angeles, Computer Science Department Los Angeles, CA E-mail: {johnny5t, pefstath}@cs.ucla.edu

More information

Robust Router Congestion Control Using Acceptance and Departure Rate Measures

Robust Router Congestion Control Using Acceptance and Departure Rate Measures Robust Router Congestion Control Using Acceptance and Departure Rate Measures Ganesh Gopalakrishnan a, Sneha Kasera b, Catherine Loader c, and Xin Wang b a {ganeshg@microsoft.com}, Microsoft Corporation,

More information

Challenges of Sending Large Files Over Public Internet

Challenges of Sending Large Files Over Public Internet Challenges of Sending Large Files Over Public Internet CLICK TO EDIT MASTER TITLE STYLE JONATHAN SOLOMON SENIOR SALES & SYSTEM ENGINEER, ASPERA, INC. CLICK TO EDIT MASTER SUBTITLE STYLE OUTLINE Ø Setting

More information

Congestion Control Review. 15-441 Computer Networking. Resource Management Approaches. Traffic and Resource Management. What is congestion control?

Congestion Control Review. 15-441 Computer Networking. Resource Management Approaches. Traffic and Resource Management. What is congestion control? Congestion Control Review What is congestion control? 15-441 Computer Networking What is the principle of TCP? Lecture 22 Queue Management and QoS 2 Traffic and Resource Management Resource Management

More information

ADDRESSING BANDWIDTH CONSTRAINTS IN THE HOSPITALITY AND SPECIALTY RETAIL INDUSTRIES

ADDRESSING BANDWIDTH CONSTRAINTS IN THE HOSPITALITY AND SPECIALTY RETAIL INDUSTRIES ADDRESSING BANDWIDTH CONSTRAINTS IN THE HOSPITALITY AND SPECIALTY RETAIL INDUSTRIES Written By: Vic Herrera, Chief Technology Officer Bandwidth for remote viewing of surveillance data consists of several

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

A Survey on Congestion Control Mechanisms for Performance Improvement of TCP

A Survey on Congestion Control Mechanisms for Performance Improvement of TCP A Survey on Congestion Control Mechanisms for Performance Improvement of TCP Shital N. Karande Department of Computer Science Engineering, VIT, Pune, Maharashtra, India Sanjesh S. Pawale Department of

More information

Broadband Quality Test Plan

Broadband Quality Test Plan Broadband Quality Test Plan Version 1.2 December 2007 Page 1 Table of Contents 1 EXPERIMENT DESIGN... 3 1.1 METRICS... 3 1.2 DESTINATIONS...4 1.3 MEASUREMENT TECHNIQUES... 6 2 TEST SETUP... 7 2.1 ISPS

More information

Scaling 10Gb/s Clustering at Wire-Speed

Scaling 10Gb/s Clustering at Wire-Speed Scaling 10Gb/s Clustering at Wire-Speed InfiniBand offers cost-effective wire-speed scaling with deterministic performance Mellanox Technologies Inc. 2900 Stender Way, Santa Clara, CA 95054 Tel: 408-970-3400

More information

Network Simulation Traffic, Paths and Impairment

Network Simulation Traffic, Paths and Impairment Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating

More information

Research on Errors of Utilized Bandwidth Measured by NetFlow

Research on Errors of Utilized Bandwidth Measured by NetFlow Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic

More information

QoS issues in Voice over IP

QoS issues in Voice over IP COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This

More information

AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS

AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS Srikanth Tiyyagura Department of Computer Science and Engineering JNTUA College of Engg., pulivendula, Andhra Pradesh, India.

More information

Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION

Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Chapter# 19 INTERNETWORK OPERATION Review Questions ٢ Network Chapter# 19 INTERNETWORK OPERATION 19.1 List

More information

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There

More information

Using TrueSpeed VNF to Test TCP Throughput in a Call Center Environment

Using TrueSpeed VNF to Test TCP Throughput in a Call Center Environment Using TrueSpeed VNF to Test TCP Throughput in a Call Center Environment TrueSpeed VNF provides network operators and enterprise users with repeatable, standards-based testing to resolve complaints about

More information

Performance Measurement of Wireless LAN Using Open Source

Performance Measurement of Wireless LAN Using Open Source Performance Measurement of Wireless LAN Using Open Source Vipin M Wireless Communication Research Group AU KBC Research Centre http://comm.au-kbc.org/ 1 Overview General Network Why Network Performance

More information

VPN over Satellite A comparison of approaches by Richard McKinney and Russell Lambert

VPN over Satellite A comparison of approaches by Richard McKinney and Russell Lambert Sales & Engineering 3500 Virginia Beach Blvd Virginia Beach, VA 23452 800.853.0434 Ground Operations 1520 S. Arlington Road Akron, OH 44306 800.268.8653 VPN over Satellite A comparison of approaches by

More information

Load Balancing Mechanisms in Data Center Networks

Load Balancing Mechanisms in Data Center Networks Load Balancing Mechanisms in Data Center Networks Santosh Mahapatra Xin Yuan Department of Computer Science, Florida State University, Tallahassee, FL 33 {mahapatr,xyuan}@cs.fsu.edu Abstract We consider

More information

IMPLEMENTING VOICE OVER IP

IMPLEMENTING VOICE OVER IP 51-20-78 DATA COMMUNICATIONS MANAGEMENT IMPLEMENTING VOICE OVER IP Gilbert Held INSIDE Latency is the Key; Compression; Interprocessing Delay; Network Access at Origin; Network Transmission Delay; Network

More information

Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop

Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop R. David Idol Department of Computer Science University of North Carolina at Chapel Hill david.idol@unc.edu http://www.cs.unc.edu/~mxrider

More information

51-30-21 Selecting a Web Server Connection Rate Gilbert Held

51-30-21 Selecting a Web Server Connection Rate Gilbert Held 51-30-21 Selecting a Web Server Connection Rate Gilbert Held Payoff Determining the best operating rate for a WAN connection to the Internet is a common problem for organizations wishing to obtain a presence

More information

Architecture and Performance of the Internet

Architecture and Performance of the Internet SC250 Computer Networking I Architecture and Performance of the Internet Prof. Matthias Grossglauser School of Computer and Communication Sciences EPFL http://lcawww.epfl.ch 1 Today's Objectives Understanding

More information

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol? Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout

More information

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013 CSE 473 Introduction to Computer Networks Jon Turner Exam Solutions Your name: 0/3/03. (0 points). Consider a circular DHT with 7 nodes numbered 0,,...,6, where the nodes cache key-values pairs for 60

More information

Technical Support Information Belkin internal use only

Technical Support Information Belkin internal use only The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.

More information

First Midterm for ECE374 03/24/11 Solution!!

First Midterm for ECE374 03/24/11 Solution!! 1 First Midterm for ECE374 03/24/11 Solution!! Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit if you show your

More information

CS 78 Computer Networks. Internet Protocol (IP) our focus. The Network Layer. Interplay between routing and forwarding

CS 78 Computer Networks. Internet Protocol (IP) our focus. The Network Layer. Interplay between routing and forwarding CS 78 Computer Networks Internet Protocol (IP) Andrew T. Campbell campbell@cs.dartmouth.edu our focus What we will lean What s inside a router IP forwarding Internet Control Message Protocol (ICMP) IP

More information

PART III. OPS-based wide area networks

PART III. OPS-based wide area networks PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity

More information

Objectives of Lecture. Network Architecture. Protocols. Contents

Objectives of Lecture. Network Architecture. Protocols. Contents Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking

More information

Outline. TCP connection setup/data transfer. 15-441 Computer Networking. TCP Reliability. Congestion sources and collapse. Congestion control basics

Outline. TCP connection setup/data transfer. 15-441 Computer Networking. TCP Reliability. Congestion sources and collapse. Congestion control basics Outline 15-441 Computer Networking Lecture 8 TCP & Congestion Control TCP connection setup/data transfer TCP Reliability Congestion sources and collapse Congestion control basics Lecture 8: 09-23-2002

More information

Visualizations and Correlations in Troubleshooting

Visualizations and Correlations in Troubleshooting Visualizations and Correlations in Troubleshooting Kevin Burns Comcast kevin_burns@cable.comcast.com 1 Comcast Technology Groups Cable CMTS, Modem, Edge Services Backbone Transport, Routing Converged Regional

More information

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand

More information

Using Simple Per-Hop Capacity Metrics to Discover Link Layer Network Topology

Using Simple Per-Hop Capacity Metrics to Discover Link Layer Network Topology Using Simple Per-Hop Capacity Metrics to Discover Link Layer Network Topology Shane Alcock 1, Anthony McGregor 1,2, and Richard Nelson 1 1 WAND Group, University of Waikato 2 NLANR Measurement and Network

More information

An Improved Available Bandwidth Measurement Algorithm based on Pathload

An Improved Available Bandwidth Measurement Algorithm based on Pathload An Improved Available Bandwidth Measurement Algorithm based on Pathload LIANG ZHAO* CHONGQUAN ZHONG Faculty of Electronic Information and Electrical Engineering Dalian University of Technology Dalian 604

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

Policy Distribution Methods for Function Parallel Firewalls

Policy Distribution Methods for Function Parallel Firewalls Policy Distribution Methods for Function Parallel Firewalls Michael R. Horvath GreatWall Systems Winston-Salem, NC 27101, USA Errin W. Fulp Department of Computer Science Wake Forest University Winston-Salem,

More information

Routing in packet-switching networks

Routing in packet-switching networks Routing in packet-switching networks Circuit switching vs. Packet switching Most of WANs based on circuit or packet switching Circuit switching designed for voice Resources dedicated to a particular call

More information

Network Performance Monitoring for Applications Using EXPAND.

Network Performance Monitoring for Applications Using EXPAND. Network Performance Monitoring for Applications Using EXPAND. Björn Landfeldt*, Aruna Seneviratne*, Bob Melander**, Per Gunningberg** *Dept. of Electrical Engineering and Telecommunications The University

More information

CONTROL SYSTEM FOR INTERNET BANDWIDTH BASED ON JAVA TECHNOLOGY

CONTROL SYSTEM FOR INTERNET BANDWIDTH BASED ON JAVA TECHNOLOGY CONTROL SYSTEM FOR INTERNET BANDWIDTH BASED ON JAVA TECHNOLOGY SEIFEDINE KADRY, KHALED SMAILI Lebanese University-Faculty of Sciences Beirut-Lebanon E-mail: skadry@gmail.com ABSTRACT This paper presents

More information

Per-Flow Queuing Allot's Approach to Bandwidth Management

Per-Flow Queuing Allot's Approach to Bandwidth Management White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth

More information

Strategies. Addressing and Routing

Strategies. Addressing and Routing Strategies Circuit switching: carry bit streams original telephone network Packet switching: store-and-forward messages Internet Spring 2007 CSE 30264 14 Addressing and Routing Address: byte-string that

More information